Network Forensics: Tracking Hackers through Cyberspace

Book Description

“This is a must-have work for anybody in information
security, digital forensics, or involved with incident handling. As
we move away from traditional disk-based analysis into the
interconnectivity of the cloud, Sherri and Jonathan have created a
framework and roadmap that will act as a seminal work in this
developing field.”

On the Internet, every action leaves a
mark–in routers, firewalls, web proxies, and within network
traffic itself. When a hacker breaks into a bank, or an insider
smuggles secrets to a competitor, evidence of the crime is always
left behind.

Throughout the text, step-by-step case
studies guide you through the analysis of network-based evidence.
You can download the evidence files from the authors’ web
site (lmgsecurity.com), and follow along to gain hands-on
experience.

Hackers leave footprints all across the
Internet. Can you find their tracks and solve the case? Pick up
Network Forensicsand find out.